Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

101.

What will be the ciphered text if route cipher is used for encrypting the plain text “SANFOUNDRY” with a number of columns given to be 5 and route of reading is down the columns?(a) SUANNDFROY(b) SORAFUDYNN(c) SNAUDNORFY(d) SANFOUNDRYThe question was posed to me during an online exam.The origin of the question is Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct CHOICE is (a) SUANNDFROY

The explanation is: For ENCRYPTING a plain text using route cipher we USE a table having 5 columns as SHOWN below. Then we read down the columns to cipher the plain text.

S

A

N

F

O

U

N

D

R

Y

So the CIPHERED text becomes “SUANNDFROY”.

102.

What will be the ciphered text if route cipher is used for encrypting the plain text “SANFOUNDRY” with number of columns given to be 5 and route from the bottom right anti clockwise?(a) SUANNDFROY(b) SORAFUDYNN(c) YOFNASUNDRY(d) SANFOUNDRYI had been asked this question by my school principal while I was bunking the class.This intriguing question comes from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer» RIGHT OPTION is (c) YOFNASUNDRY

Explanation: For encrypting a plain text using route cipher we use a table having 5 columns as shown below. Then we READ from the bottom right anti CLOCKWISE to cipher the plain text.

S

A

N

F

O

U

N

D

R

Y

So the ciphered text becomes “YOFNASUNDRY”.
103.

What will be the plain text corresponding to cipher text “SFNUFACT” if with number of columns are given to be 3 and route of reading is from the bottom right anti clockwise?(a) FACTSFUN(b) FACTFUNS(c) FUNSFACT(d) FUNFACTSI have been asked this question in an interview for internship.I need to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (d) FUNFACTS

The best EXPLANATION: For DECRYPTION we REVERSE the process used in encryption. So we arrange the letters of cipher text from bottom right anti CLOCKWISE and then read the grid horizontally.

F

U

N

F

A

C

T

S

So the resulting plain text is “FUNFACTS”.

104.

What will be the plain text corresponding to cipher text “RSEADC” if with the number of columns are given to be 3 and route of reading is down the columns?(a) SACRED(b) DERSAC(c) REDSAC(d) SEDRACI have been asked this question during an interview.My question is taken from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT OPTION is (c) REDSAC

The explanation is: For decryption we reverse the process USED in encryption. So we arrange the LETTERS of cipher text down the columns and then read the grid horizontally.

R

E

D

S

A

C

So the resulting plain text is “REDSAC”.

105.

Router cipher becomes less secure when we have to encrypt longer messages.(a) true(b) falseI had been asked this question in class test.This question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct OPTION is (b) false

Explanation: The key of ROUTE cipher not only DEFINES the SIZE of grid but also the path that is to be followed. So longer the message is, the harder it BECOMES to guess the path.

106.

Rail fence cipher is more secure as compared to route cipher?(a) true(b) falseI had been asked this question in an interview for job.This question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Right OPTION is (b) false

Explanation: Rail fence is CIPHER is less secure than route cipher. It is because the key of route cipher not only DEFINES the size of the grid but ALSO the path that is to be followed.

107.

Route cipher is closely related to?(a) Autokey cipher(b) Hill cipher(c) Rail fence cipher(d) Columnar transposition cipherI got this question in an online interview.This intriguing question originated from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (c) Rail fence cipher

Best explanation: ROUTE cipher is closely related to rail fence cipher. In rail fence cipher the PLAIN text is written in a zig ZAG fashion in a grid whereas in route cipher the plain text is written HORIZONTALLY.

108.

Which of the following ciphers are created by shuffling the letters of a word?(a) playfair cipher(b) route cipher(c) vigenere cipher(d) hill cipherI had been asked this question in a job interview.My doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer» CORRECT choice is (b) route cipher

The best I can EXPLAIN: In transposition cipher the LETTERS of the given data are shuffled in a particular ORDER, FIXED by a given rule. Route cipher is the only transposition cipher out of the given options.
109.

Encryption in Route cipher is done ___________(a) by arranging the letters in a zig zag fashion in a table(b) by randomly arranging letters(c) by following an imaginary pattern drawn on a grid(d) by swapping adjacent lettersThis question was addressed to me during an internship interview.The query is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Right option is (C) by following an imaginary pattern drawn on a grid

Best EXPLANATION: Route CIPHER is a transposition cipher. It encrypts the plain TEXT by following an imaginary pattern on a grid.

110.

Route cipher is an example of ____________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThe question was posed to me in unit test.Asked question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Right CHOICE is (c) transposition cipher

The best EXPLANATION: Route cipher is a transposition cipher. It falls under the category of transposition cipher as it encrypts the plain TEXT by REARRANGING its letters.

111.

What is route cipher?(a) a transposition cipher that performs encryption by following an imaginary pattern on a grid(b) a substitution cipher that performs encryption by following an imaginary pattern on a grid(c) a transposition cipher that performs encryption by following a zig zag pattern on a grid(d) a substitution cipher that performs encryption by following a zig zag pattern on a gridThis question was addressed to me by my school teacher while I was bunking the class.This is a very interesting question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (a) a transposition CIPHER that performs encryption by following an imaginary pattern on a grid

Easiest explanation - Route cipher is a transposition cipher. It ENCRYPTS the plain TEXT by following an imaginary pattern on a grid. This pattern can VARY from one VERSION of route cipher to others.

112.

What will be the ciphered text if rail fence cipher is used for encrypting the plain text “SANFOUNDRY” with the key value given to be 2?(a) SNONRAFUDY(b) SORAFUDYNN(c) SNAUDNORFY(d) SANFOUNDRYI have been asked this question in an online interview.Question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

The correct OPTION is (a) SNONRAFUDY

For EXPLANATION: For encrypting a plain text using rail FENCE cipher we USE a table having the NUMBER of rows equal to key value as shown below. Then we read along the rows to get the ciphered text.

S

 

N

 

O

 

N

 

R

 

 

A

 

F

 

U

 

D

 

Y

So the ciphered text becomes “SNONRAFUDY”.

113.

In which of the following cipher the plain text and the ciphered text have same letters?(a) autokey cipher(b) rail fence cipher(c) vigenere cipher(d) additive cipherI have been asked this question in an interview for job.My question is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (b) rail fence cipher

For explanation: In transposition cipher the LETTERS remain the same in CIPHERED and plain TEXT. Their position is only changed WHEREAS in substitution cipher the letters become different in ENCRYPTED text. So rail fence cipher will be the correct option.

114.

Rail fence cipher is more secure than one time pad cipher.(a) True(b) FalseThis question was posed to me at a job interview.I need to ask this question from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (B) False

Best EXPLANATION: One time pad CIPHER is one of the most secure traditional cipher as it is ALMOST impossible to CRACK. Rail fence cipher is not very hard to crack. Thus rail fence cipher is less secure than one time pad cipher.

115.

What will be the plain text corresponding to cipher text “SCSEMG” if rail fence cipher is used with key value 2?(a) MSGSEC(b) SECMSG(c) GSMSEC(d) SECGSMThis question was posed to me during an online exam.The doubt is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT choice is (b) SECMSG

The explanation is: For DECRYPTION we reverse the process used in encryption.

S

 

C

 

S

 

 

E

 

M

 

G

So the resulting plain text is “SECMSG”.

116.

The number of columns in the table used for encryption in rail fence cipher depends upon the given key value.(a) True(b) FalseI had been asked this question during an interview.I'd like to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (b) False

To explain: The number of COLUMNS in the table of rail fence cipher is always equal to the number of letters in the plain TEXT. It is independent of the GIVEN KEY value.

117.

Which of the following is are two types of traditional cipher?(a) transposition cipher and replacement cipher(b) transposition cipher and substitution cipher(c) transforming cipher and substitution cipher(d) transforming cipher and replacement cipherI got this question during an internship interview.This intriguing question originated from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct ANSWER is (b) transposition CIPHER and SUBSTITUTION cipher

For explanation: There are two types of a traditional cipher. First is transposition cipher and the second is substitution cipher.

118.

Which of the following is not a type of poly alphabetic cipher?(a) Autokey cipher(b) Hill cipher(c) One time pad cipher(d) Additive cipherThis question was posed to me during an interview.Query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (d) Additive cipher

Explanation: In poly alphabetic cipher each SYMBOL of PLAIN TEXT is replaced by a DIFFERENT cipher text regardless of its occurrence. Out of the given OPTIONS, only additive cipher is not a poly alphabetic cipher.

119.

Which of the following ciphers are created by shuffling the letters of a word?(a) substitution cipher(b) transposition cipher(c) vigenere cipher(d) hill cipherThis question was posed to me in my homework.I'm obligated to ask this question of Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

The correct CHOICE is (b) TRANSPOSITION CIPHER

Explanation: There are two types of traditional ciphers- Transposition and SUBSTITUTION cipher. In transposition cipher the letters of the given data are SHUFFLED in a particular order, fixed by a given rule.

120.

Encryption in Rail fence cipher is done using _____________(a) by arranging the letters in a zig zag fashion in a table(b) by randomly arranging letters(c) by arranging letters in vigenere table(d) by swapping adjacent lettersThis question was addressed to me in an international level competition.Enquiry is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (a) by arranging the LETTERS in a zig ZAG fashion in a table

The explanation is: Rail fence cipher is a TRANSPOSITION cipher. It ENCRYPTS a GIVEN plain text by arranging the letters in a zig zag fashion in a table.

121.

Rail fence cipher is an example of ___________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI got this question during an interview.My enquiry is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Right option is (c) TRANSPOSITION cipher

Easiest explanation - RAIL fence cipher is a transposition cipher. It falls under the category of transposition cipher as it encrypts the plain TEXT by rearranging its LETTERS.

122.

What is the alternative name given to Rail fence cipher?(a) random cipher(b) matrix cipher(c) zig zag cipher(d) columnar cipherThis question was posed to me in homework.My doubt is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (c) ZIG zag cipher

The best explanation: RAIL fence cipher is also known as zig zag cipher. It is so because the plain text GETS ciphered by arranging the letters in a zig zag fashion.

123.

What will be the ciphered text if the plain text “SAN” is encrypted using hill cipher with keyword as “GYBNQKURP”?(a) RAJ(b) JAR(c) ARJ(d) AJRThe question was asked by my school principal while I was bunking the class.The doubt is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (a) RAJ

Easiest explanation - We first CONVERT the KEYWORD and plain text into their corresponding matrix respectively. Then we MULTIPLY those matrix and take MODULO 26 of the resulting matrix to get the CIPHERED text.

124.

A key matrix used for encryption in hill cipher must be?(a) invertible matrix(b) non invertible matrix(c) square matrix(d) rectangular matrixI got this question during an online exam.The above asked question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (a) invertible matrix

Explanation: A key matrix used for encryption in hill cipher must be invertible matrix. OTHERWISE it will be impossible to DECIPHER the MESSAGE.

125.

What will be the size of a key matrix if the plain text is “SECRET”?(a) 1×6(b) 5×1(c) 6×1(d) 6×6The question was asked during a job interview.This interesting question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT ANSWER is (d) 6×6

The best explanation: HILL cipher USES a n x n matrix in order to cipher the plain text. In this case n=6 so a 6×6 matrix will be used.

126.

What will be the plain text corresponding to cipher text “YGQ“ if hill cipher is used with keyword as “GYBNQKURP”?(a) SECRET(b) WORLD(c) DOLLAR(d) HELLOThe question was posed to me during an interview.My query is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (a) SECRET

To explain: To decrypt the message we follow the REVERSE procedure. We first find the inverse of the KEYWORD matrix then multiply it with cipher matrix.

127.

Hill cipher is harder to crack than playfair cipher.(a) True(b) FalseI got this question during an interview.My question comes from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (b) False

Easy EXPLANATION - Both HILL CIPHER and playfair cipher are less VULNERABLE to frequency analysis. But hill cipher is quite vulnerable to other FORMS of attack and thus less secure than playfair cipher.

128.

Which of the following is hardest to break using frequency analysis?(a) Vigenere cipher(b) Hill cipher(c) Caesar cipher(d) Affine cipherThis question was posed to me in an internship interview.My question is based upon Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (b) HILL CIPHER

Easy explanation - Out of the given OPTIONS hill cipher is the HARDEST cipher to break using frequency analysis. ALTHOUGH it is quite vulnerable to other forms of attack.

129.

Which of the following was the first poly graphic cipher to be able to operate on more than 3 letters at once?(a) autokey cipher(b) hill cipher(c) one time pad cipher(d) playfair cipherI got this question in quiz.The doubt is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer» RIGHT choice is (b) hill CIPHER

Explanation: Poly graphic cipher is a type of substitution cipher in which substitution is performed over a BLOCK of LETTERS. Hill cipher was the first poly graphic cipher to be able to operate on more than 3 letters at once.
130.

What is poly graphic substitution cipher?(a) a substitution based cipher which uses multiple substitutions at different positions(b) a substitution based cipher which uses fixed substitution over entire plain text(c) a substitution based cipher in which substitution is performed over a block of letters(d) a transposition based cipher which uses fixed substitution over entire plain textI had been asked this question in an interview for job.The query is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT choice is (C) a substitution based cipher in which substitution is performed over a block of letters

The best I can EXPLAIN: Poly graphic cipher is a type of substitution cipher in which substitution is performed over a block of letters. Hill cipher is an EXAMPLE of poly graphic cipher.

131.

Encryption in hill cipher is done using ______________(a) matrix multiplication(b) a 5×5 table(c) vigenere table(d) matrix inversionThis question was posed to me in an interview for internship.Question is taken from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (a) matrix MULTIPLICATION

Easiest EXPLANATION - Encryption of PLAIN text in playfair cipher is done using matrix multiplication. Then MODULO 26 of the resulting matrix is taken so as to GET the ciphered text.

132.

Hill cipher is an example of ____________(a) mono-alphabetic cipher(b) substitution cipher(c) transposition cipher(d) additive cipherI have been asked this question in an online quiz.I'd like to ask this question from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (b) substitution CIPHER

Explanation: HILL cipher is a substitution cipher. It falls under the category of poly ALPHABETIC cipher as it uses multiple substitutions at different positions in order to cipher the plain text.

133.

Hill cipher requires prerequisite knowledge of?(a) integration(b) differentiation(c) matrix algebra(d) differential equationThis question was posed to me in quiz.The query is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (c) MATRIX algebra

Explanation: Hill cipher uses matrix multiplication in order to encrypt the given plain text. So it REQUIRES prerequisite KNOWLEDGE of matrix algebra.

134.

What is the rule for encryption in playfair cipher if the letters in a pair does not appear in same row or column?(a) they are replaced by the letter appearing immediately below them respectively(b) they are replaced by the letter appearing immediately right to them respectively(c) they are replaced by the letter of the same row at the corner of the rectangle defined by the original pair respectively(d) that pair is neglectedI got this question in final exam.The question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct ANSWER is (c) they are REPLACED by the letter of the same row at the CORNER of the rectangle defined by the original pair respectively

The best I can explain: If the letters in a pair does not appear in same row or COLUMN then they are replaced by the letters of the same row at the corner of the rectangle defined by the original pair respectively. The order of letters should be maintained.

135.

What is the rule for encryption in playfair cipher if the letters in a pair appear in same column?(a) they are replaced by the letter appearing immediately below them respectively(b) they are replaced by the letter appearing immediately right to them respectively(c) they are replaced by the letters at the corner of the row(d) that pair is neglectedI have been asked this question in an online interview.The query is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Right option is (a) they are REPLACED by the letter appearing IMMEDIATELY below them respectively

The BEST I can explain: If the letters in a pair appear in the same column then they are replaced by the letters appearing immediately below them respectively. If the ELEMENT to be replaced appears at the corner of the column then we wrap around to the TOP side of that column.

136.

What will be the ciphered text if the string “SANFOUNDRY” is given as input to the code of playfair cipher with keyword as “SECRET” (assuming j is combined with i)?(a) ZHQAPNPAFR(b) AHQAPNPAFR(c) HAQAPNPAFR(d) QHAAPNPAFRThe question was asked in unit test.My question comes from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (b) AHQAPNPAFR

Easiest EXPLANATION - For encrypting the plain text using PLAYFAIR cipher we use a 5×5 table that is constructed by using keyword. Then we apply rules for ENCRYPTION in ORDER to get the ciphered text. Table is GIVEN as under-

137.

What is the rule for encryption in playfair cipher if the letters in a pair appear in same row?(a) they are replaced by the letter appearing immediately below them respectively(b) they are replaced by the letter appearing immediately right to them respectively(c) they are replaced by the letter at the corner of the row(d) that pair is neglectedI had been asked this question in an interview for internship.Question is taken from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer» RIGHT answer is (b) they are replaced by the LETTER APPEARING immediately right to them respectively

Best explanation: If the letters in a pair appear in same row then they are replaced by the letters appearing immediately right to them respectively. If the element to be replaced appears at the CORNER of the row then we wrap around to the left side of that row.
138.

What is the rule for encryption in playfair cipher if the letters in a pair are identical?(a) then that pair is neglected(b) a null is added in between the letters(c) one of the identical letter is replaced by some other letter(d) then both of the letters are replaced by the letter appearing just next in the rowThe question was posed to me in an online interview.I'm obligated to ask this question of Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (b) a null is ADDED in between the LETTERS

Easy explanation - In PLAYFAIR cipher if the letters in a PAIR are identical then a null is added in between the letters. Any letter can be used as a null as LONG as that letter is not the one being repeated.

139.

What will be the plain text corresponding to cipher text “BPKYFS” if playfair cipher is used with keyword as “SECRET” (assuming j is combined with i)?(a) INDIAN(b) WORLD(c) DOLLAR(d) HELLOThe question was asked in an interview for job.I'm obligated to ask this question of Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (C) DOLLAR

The explanation is: To DECRYPT the message we FOLLOW the reverse procedure. The table is formed in the same manner. APPLYING this we get the plain text to be “DOLLAR”.

140.

Playfair cipher is harder to crack than keyword cipher.(a) True(b) FalseThis question was addressed to me during an online exam.The origin of the question is Cryptography in section Cryptography of Data Structures & Algorithms II

Answer» CORRECT option is (a) True

For explanation: Keyword cipher is less secure than playfair cipher. It is due to the FACT that keyword cipher is mono alphabetic and thus can be cracked using FREQUENCY ANALYSIS. But playfair cipher being a poly graphic substitution cipher is harder to break using this method.
141.

Which of the following was the first diagram substitution cipher?(a) autokey cipher(b) hill cipher(c) one time pad cipher(d) playfair cipherI have been asked this question by my school teacher while I was bunking the class.My question is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (d) playfair cipher

For explanation: Poly GRAPHIC cipher is a TYPE of substitution cipher in which substitution is performed over a BLOCK of LETTERS. In diagram substitution, two adjacent letters are SUBSTITUTED simultaneously. Playfair cipher was the first diagram substitution cipher.

142.

Which of the following is hardest to break using frequency analysis?(a) Vigenere cipher(b) Autokey cipher(c) Playfair cipher(d) Rotor cipherThe question was posed to me in unit test.My query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right option is (c) Playfair cipher

For explanation: Out of the given OPTIONS playfair cipher is the hardest cipher to break USING frequency analysis. It is because it does not substitute LETTERS of the WORD individually but it encrypts them in pairs of two.

143.

Which of the following correctly defines poly graphic substitution cipher?(a) a substitution based cipher which uses multiple substitutions at different positions(b) a substitution based cipher which uses fixed substitution over entire plain text(c) a substitution based cipher in which substitution is performed over a block of letters(d) a transposition based cipher which uses fixed substitution over entire plain textThis question was posed to me in an international level competition.My doubt stems from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer» CORRECT choice is (c) a substitution based CIPHER in which substitution is performed over a block of letters

The best I can EXPLAIN: POLY graphic cipher is a TYPE of substitution cipher in which substitution is performed over a block of letters. Playfair cipher is an example of poly graphic cipher.
144.

Encryption in Autokey cipher is done using __________(a) a 5×5 table(b) a 13×2 table(c) vigenere table(d) a 6×6 tableI had been asked this question in a national level competition.This interesting question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (c) VIGENERE table

For explanation: Encryption of plain text in playfair cipher is done using a 5×5 table. In this table, all the alphabets of the KEYWORD are arranged ROW wise by eliminating any duplicates then the REMAINING letters of the alphabet are placed. One of the alphabet has to be OMITTED in order to fit all the alphabets in the table.

145.

Playfair cipher is an example of __________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI had been asked this question in quiz.I'm obligated to ask this question of Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer» RIGHT choice is (b) POLY-alphabetic cipher

For explanation: Playfair cipher is a substitution cipher. It falls under the category of poly alphabetic cipher as it uses multiple substitution at different POSITIONS in order to cipher the plain text.
146.

What is the alternative name of playfair cipher?(a) Wadsworth’s cipher(b) Wheatstone playfair cipher(c) Playfair rectangle(d) Wheatstone cipherThe question was posed to me in exam.The origin of the question is Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (B) Wheatstone playfair CIPHER

Easy explanation - Playfair cipher is ALSO known by the name of Wheatstone playfair cipher. It is because it was DISCOVERED by Charles Wheatstone but was PROMOTED by Lord Playfair.

147.

Vigenere cipher is harder to crack than autokey cipher.(a) true(b) falseThe question was posed to me during an online exam.Origin of the question is Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (B) false

Best explanation: Autokey CIPHER is harder to CRACK than VIGENERE cipher. It is because in autokey cipher the key is formed using the plain text itself whereas in vigenere cipher the key is independent of the plain text. This makes autokey cipher more SECURE.

148.

What will be the ciphered text if the string “SECRET” is given as input to the code of autokey cipher with keyword as “SANFOUNDRY”?(a) KEPWSN(b) EKWPSN(c) EKWPSNFDED(d) KEPWSNFDEDI had been asked this question in an interview for job.Origin of the question is Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (a) KEPWSN

For explanation: For ENCRYPTING a plain text in autokey cipher we first add the keyword at the beginning of the plain text in order to obtain the key for encryption. Then we USE the VIGENERE table for making RESPECTIVE substitutions.

149.

In which of the following cipher the plain text and the ciphered text does not have same number of letters?(a) affine cipher(b) autokey cipher(c) columnar cipher(d) additive cipherI had been asked this question during an interview.Origin of the question is Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (B) AUTOKEY cipher

Easy EXPLANATION - In transposition cipher and mono alphabetic cipher the number of letters remain same in ciphered and deciphered text. But in poly alphabetic cipher the number of letters are different. So here as autokey cipher is the only poly alphabetic cipher so it will be the answer.

150.

Autokey cipher is also known as?(a) vigenere cipher(b) autoclave cipher(c) auto key cipher(d) auto cipherThis question was posed to me during an interview for a job.Question is taken from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (b) autoclave CIPHER

The best I can EXPLAIN: Autoclave cipher is an alternative name given to autokey cipher. It is because the encrypted text is formed using a key that is GENERATED from a message(PLAIN text) itself.